What is HERTZ. I need help with this software update and the update says it is using HERTS, or HZ

Answers

Answer 1

Answer: HERTZ or HZ is a unit of measurement for sound

Explanation:

HZ is the wavelength of a wave, usually sound. the faster the wavelength the higher the pitch. no clue why your computer is using it to update though


Related Questions

once the os is known, the vulnerabilities to which a system is susceptible can more easily be determined. True or false?

Answers

The statement "once the OS is known, the vulnerabilities to which a system is susceptible can more easily be determined" is generally true.

The operating system (OS) is a critical component of a computer system, as it manages hardware resources and provides a platform for running applications. The vulnerabilities of a system can depend on the specific OS being used, as different operating system have different designs, features, and security mechanisms. Therefore, understanding the specific OS being used can help to identify potential vulnerabilities and threats to the system.

For example, an OS like Windows may be more susceptible to viruses and malware, while a Unix-based OS may be more susceptible to network-based attacks. Additionally, different versions of an OS may have different vulnerabilities depending on the specific features or configurations that are enabled or disabled.

Knowing the OS can also help to identify patches or updates that need to be applied to the system to address known vulnerabilities. Operating system vendors often release updates and patches to address security issues, and keeping the OS up to date can help to mitigate potential threats.

However, it is important to note that simply knowing the OS is not enough to completely determine the vulnerabilities to which a system is susceptible. Additional factors such as network topology, hardware configuration, and application software must also be considered. Therefore, a comprehensive approach to system security should involve a thorough analysis of all these factors, along with appropriate security measures and best practices.

What is an OS used in computer and mobile devices?:

brainly.com/question/1763761

#SPJ11

All keyboards are made up of the main ______ area, the ______ keys and the _______ keys.

A. Typing, Number, Symbol
B. Letter, Number, Control
C. Typing, Function, Control

Answers

Answer:

A.

Explanation:

All keyboards are made up of the main Typing area, the Number keys and the Symbol keys.

A set of data with a correlation coefficient of -0.855 has a a. moderate negative linear correlation b. strong negative linear correlation c. weak negative linear correlation d. little or no linear correlation

Answers

A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Thus, A correlation coefficient gauges how closely two variables are related to one another. The Pearson coefficient, which has a range of -1.0 to +1.0, is the correlation coefficient that is most frequently employed.

Two variables that have a positive correlation tend to move in the same direction. Two variables with a negative correlation tend to move in the opposing directions.

While a correlation value of -0.3 or lower shows a very weak association, one of -0.8 or lower suggests a strong negative relationship.

Thus, A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Learn more about Corelation, refer to the link:

https://brainly.com/question/30116167

#SPJ4

Select the correct answer.
What needs to be defined throughout an animation sequence to define the start and end points of motion?

A frames
B. characters
C. key frames
D. movement

Answers

i think the answer is c

Explain what Tom should do in the following scenario, and why.

Situation: Tom is writing a program that will be used to store car descriptions for all cars in the dealership. He already has code for a public class name CarDetails.

Answers

Answer:

Tom should most definitely continue writing his program, and its good that he has a code for a public class name. Tom should keep going with the project and see what others think, if they approve then its truly ready. Because In order to write the rest of his program that he wants, he needs to continue what he's doing.

Explanation:

Project stem 2.3 code practice question 2

Answers

Answer:

"Write a program that accepts two decimal numbers as input and outputs their sum."

a = float(input("Enter an integer: "))

b = float(input("Enter an integer: "))

print(a + b)

Explanation:

We are just entering an integer and having the code float the variable down to our print function thats why we have added the "float" variable

Glad to help!
Stay up and Stay Blessed!

Information that is sent across a network is divided into chunks called __________.

Answers

Answer:

Packets

Explanation:

Read these lines from "March Evening."Puddles lie split in the road a mass, notOf water, but steel, with its cold, hard sheen.What is the connotative meaning of the word split as used in the poem?acrossmingledpoolingruptured

Answers

The connotative meaning of "Split" in the lines indicated from the question is - Across.

About March Evening

The narrator in the poem captioned above tries to capture the essence of spring as it sets in. All the ice is not completely melted, there is a mix of ice and water on the roads, hence the line

"Puddles...not of water, but steel with its cold, hard sheen"

The correct answer, therefore, is A.

See the link below for more about the Poem March Evening by Amy Lowell:

https://brainly.com/question/26143581

Answer:

Ruptured

Explanation:

took the test, not to throw the guy above me under the bus but across was wrong..

which authentication mechanism does 802.1x usually rely upon?

Answers

The authentication mechanism that 802.1x usually relies upon is EAP (Extensible Authentication Protocol).

The IEEE 802.1X is a standard protocol of the IEEE 802.11 that allows you to grant access control to network resources, especially those in a wireless network. The standard 802.1X port-based network access control is also called port-level authentication. This standard allows the network to access different resources after authentication.

EAP is an authentication protocol used to secure network connections. It works by transporting various authentication methods to a network connection. EAP is often used with wireless networks since it provides more secure authentication than WEP, which has a relatively low level of encryption.

Local area networks (LANs) and dial-up connections both make use of the authentication framework known as Extensible Authentication Protocol (EAP). Client authentication and a wireless LAN are the primary uses of EAP in wireless communication.

Know more about Extensible Authentication Protocol:

https://brainly.com/question/20813972

#SPJ11

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. A bool variable named norecall has been declared . Given an int variable modelYear write a statement that assigns true to norecall if the value of modelYear does NOT fall within the recall range and assigns false otherwise. Do not use an if statement in this exercise!

Answers

Answer:

The statement (in Python) is as follows:

recalled = modelYear >=2001 and modelYear <=2006

Explanation:

Required

A statement without an if statement to assign true or false to recalled

Using an if statement, the comparison is

if modelYear >=2001 and modelYear <=2006:

    recalled = True

else:

    recalled = False

To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.

recalled = modelYear >=2001 and modelYear <=2006

Note that, we assume that there is an input fo variable modelYear

Think of a situation in the not-too-distant future in which an autonomous robot, for example a factory manufacturing robot or a self-driving car, through some unfortunate coincidental combination of circumstances accidentally causes a human serious injury or even death. In a case such as this, who should be held responsible for the crime and damages? Can the developer or team of developers who wrote the code justifiably be held responsible? Is it simply considered a mechanical malfunction and nobody is held responsible, but the machine is destroyed?

Answers

Machines do not have souls and hence cannot have a will. They do what they are programmed to do. Any error that a machine no matter how intelligent, makes must be considered vicarious. This means that the makes must all be held liable for their errors.

What is Vicarious liability?

Vicarious liability is a type of stringent, secondary liability that derives from the common law theory of agency, respondeat superior, or the superior's responsibility for the actions of their subordinate.

Attachment of blame to a person for injury or losses caused by another person in a negligence action or criminal prosecution (also known as "imputed culpability"). Vicarious responsibility is a type of tort that holds an employer liable for a tort committed by his employee while the latter is on the job.

There are various forms of business insurance available to protect business owners from vicarious liability claims, including general liability, errors and omissions, and umbrella insurance, which covers everything not covered by general liability insurance.

Learn more about Vicarious liability:
https://brainly.com/question/16891800
#SPJ1

A system administrator suspects a memory leak is occurring on a client. Determine which scenario would justify this finding.
A rapid decrease in disk space has been logged.
High page file utilization has been logged.
High utilization when employees are not working has been logged without a scheduled activity.
Decreasing available bytes and increasing committed bytes have been logged.
Decreasing available bytes and increasing committed bytes have been logged

Answers

Since the system administrator suspects a memory leak is occurring on a client, the scenario that would justify this finding is option D:  Decreasing available bytes and increasing committed bytes have been logged

What would cause a memory leak?

When a program requests memory from the operating system for itself and its data, a memory leak begins. A program occasionally requests more memory as it runs and needs more memory at other times.

System administrators—also known as system admins—are information technology (IT) specialists that ensure sure an organization's computer systems are functional and suit the needs of the organization.

Therefore, In computer science, a memory leak is a form of resource leak that happens when a computer program wrongly manages memory allocations in a way that prevents memory that is no longer needed from being released. Sysadmins support, troubleshoot, and maintain computer systems and networks. When an item is kept in memory but cannot be accessible by the program that is executing, this can also result in a memory leak.

Learn more about system administrator  from

https://brainly.com/question/27129590
#SPJ1

enter the above adjacency matrix a into matlab. by looking at the entry of a3 in the first row and the fifth column, find the number of ways to get from san diego to manila with exactly two stops. include your input and output in your document. does your answer here agree with your explicit count in the previous exercise? if not, add the missing trips to your answers of the previous exercise.now use matlab find the number of ways to get from manila to seattle with at most four stops. note that this is not the same as finding the number of ways with exactly four stops! include all of your commands and output in your write-up.

Answers

To find the number of ways to get from San Diego to Manila with exactly two stops, we need to look at the entry of A^3 in the first row and the fifth column. In MATLAB, we can enter the adjacency matrix A as follows:

A = [0 1 1 0 0; 1 0 1 1 0; 1 1 0 1 1; 0 1 1 0 1; 0 0 1 1 0];

Then, to find A^3, we can use the following command:

A3 = A^3;

Finally, to find the entry in the first row and the fifth column, we can use the following command:

num_ways = A3(1,5);

The output will be the number of ways to get from San Diego to Manila with exactly two stops.

To find the number of ways to get from Manila to Seattle with at most four stops, we need to find the sum of the entries in the fifth row and the fourth column of A, A^2, A^3, and A^4. We can do this using the following commands:

A2 = A^2;
A3 = A^3;
A4 = A^4;
num_ways = A(5,4) + A2(5,4) + A3(5,4) + A4(5,4);

The output will be the number of ways to get from Manila to Seattle with at most four stops.

Learn more about MATLAB:

https://brainly.com/question/15071644

#SPJ11

does anyone have a pdf of the greatest by eddie van der meer????

Answers

Answer

aight' so im finding it but i have to asnwer before someone else so look in the comments for it.

Explanation:

Just wait i getting it rn

i need help with computer science
im on Write Password Evaluator

Answers

Answer: Password Evaluator is designed to examine passwords and tentative passwords to look for dictionary words and patterns that a password cracking tool might exploit. It looks for reversed, rotated, keyboard shifted, truncated, dropped letters, substituted characters and other variations on dictionary words both singly and in many combinations.

Explanation:

Why are laptop and palmtop computers popular these days?(long answer)

Answers

Answer:

i know of laptop only

Explanation:

laptop is popular these days because it is easier than desktops we can take it everywhere. it is cheaper than desktop computers. if we lost some data we can recover it any time. it is not heavy compared to desktops. it does need keyboard and mouse unless we decide it. it takes low servicieng cost. it takes very less space then the desktops.

a(n) blank converts the programming instructions written by programmers into a language that the computer understands and processes.

Answers

A compiler converts the programming instructions/code written by programmers into a language that a computer can understand and process.

Computer devices do not understand human language constructs and it is very difficult for humans to write operational codes in computers' understandable formats. Programming languages are designed for humans to read and understand easily. It is necessary that the program or source code is to be translated into machine language so that the computer can interpret and execute the program; since the computers only understand machine language. Thus, to solve this issue, the compiler comes into action. A compiler takes the program code/source code, and converts the source code to a machine language, called an object file, that a computer understands and processes as per the requirements.

You can learn more about compiler at

https://brainly.com/question/28390894

#SPJ4

OkkKkkkkkEYEYYEYEYEY BYEYYEYEYEyeeyeyyeEYEy if you know you know

Answers

Answer:

okkkkkkkkkkeyyyyyyy

Explanation:

byeeeee

When is a for loop used in a Java Program?

A. When you already know how many times to perform an action.
B. When you want to test how many times to perform an action.
C. When you don't know how many times to perform an action.
D. When you want to define the name of an action.

Answers

Answer:

A

Explanation

Use "for loop" when size/length is pre-defined/know, such as

int[] numbers = new int[]{ 1,2,3,4,5,6,7,8,9,10 };

length : 10

snippet:

numbers.forEach(int num in numbers){

}

// or

for(int i=0; i < numbers.length ; i++){

}

Which one of the following actions helps increase a company's image rating/brand reputation? Copyright o by 0l-Bus Sotware ine. Copyeng. distrituting, or 3rd party webeile potting iseripressy proh bited and consthintes coppight violation

O Establishing a weekly assembly quota for camera/drone PATs that is the lowest of any company in the industry

O Spending sizable sums of money for multiple social responsibility initiatives and good corporate citizenship over a multi-year period

O Having the industry-high levels of PAT productivity for assembling both action cameras and UAV drones

O Using environmentally friendly camera components and recycled materials for manuals and packaging for the company's action cameras

O Building a widely recognized reputation for paying camera/drone PAT members the biggest total annual compensation package of any company in the industry

Answers

Spending sizable sums of money for multiple social responsibility initiatives and good corporate citizenship over a multi-year period helps increase a company's image rating/brand reputation.

Among the given options, spending sizable sums of money for multiple social responsibility initiatives and good corporate citizenship over a multi-year period is the action that can significantly enhance a company's image rating and brand reputation.

Engaging in social responsibility initiatives demonstrates a company's commitment to making a positive impact on society and the environment. By investing in initiatives such as community development, environmental sustainability, philanthropy, employee well-being, or ethical business practices, a company can improve its reputation and perception among stakeholders, including customers, employees, investors, and the general public.

Sizable financial contributions made over a multi-year period demonstrate a long-term commitment to social responsibility and corporate citizenship, showcasing the company's values and dedication beyond short-term gains. Such actions can build trust, credibility, and goodwill for the company, leading to enhanced brand reputation and a more positive image in the eyes of stakeholders.

Among the provided options, spending sizable sums of money for multiple social responsibility initiatives and good corporate citizenship over a multi-year period is the action that can effectively increase a company's image rating and brand reputation. This commitment to social responsibility demonstrates the company's values, builds trust, and fosters a positive perception among stakeholders, ultimately benefiting the company's overall reputation and standing in the industry.

To know more about brand reputation visit

https://brainly.com/question/31686926

#SPJ11

With _____, human thinking and problem-solving is performed by a machine, including learning, reasoning, and self-correction. wearable technologies quantum computers artificial intelligence Moore's Law

Answers

Answer:

THE ANSWER IS B

Explanation:

When opening a new scene in PlayCanvas, which of the following objects in automatically included

Answers

When opening a new scene in PlayCanvas, the objects that is  automatically included is a box, cylinder or cone.

What is PlayCanvas?

This is known to be a kind of a Computer application. The  PlayCanvas is said to be a form of an open-source 3D game engine and it is known to have a interactive 3D application engine with a proprietary cloud-hosted creation means that aids in the simultaneous editing from a lot of computers via the  use of a  browser-based interface.

Hence,  When opening a new scene in PlayCanvas, the objects that is  automatically included is a box, cylinder or cone.

Learn more about Games from

https://brainly.com/question/27355039

#SPJ1

What are some good digital habits?

Answers

Turn off notifications

Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery. True or false

Answers

Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.

How is IoT used in automation?

The Internet of Things (IoT) is known to be one of the main driving factor that is said to have brought a lot of power which has helped in the  enabling of the growth as well as the development of industrial automation systems.

Note that IoT that is said to be used along with computer automation controls can be able to aid one to streamline industrial systems as well as improve data automation, with the aim of deleting errors and inefficiencies of  people.

Therefore, Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.

Learn more about internet of things from

https://brainly.com/question/19995128
#SPJ1

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

network centrality theory suggests which of the following? select one: a. user engagement is central to an organization's effectiveness online. b. stickiness on the web requires a high user volume. c. the influence of a user is a function of the number of people they are connected with and their decision to spread the message. d. the content of the hospital website must address the individual's value system.

Answers

The correct answer to the question is that "the influence of a user is a function of the number of people they are connected with and their decision to spread the message" which is suggested by network centrality theory (Option c).

Network centrality is a measure of a network's topology that depicts the relative importance of nodes. In social networks, it is calculated based on the position of a node in a network. These are some of the definitions that will assist in understanding the answer to the question.

Network centrality theory:

It is a network analysis technique that is used to determine the relative significance of nodes in a network. Network centrality is a measure of the significance of nodes in a network based on their placement. The nodes with the most connections are the most important in a network.

Different centrality measures can be used to evaluate a network's centrality, including degree, betweenness, and closeness. The influence of a user is a function of the number of people they are connected with and their decision to spread the message: This is the definition of the phrase "The influence of a user is a function of the number of people they are connected with and their decision to spread the message."

In social network analysis, the concept of influence is vital. This concept refers to a user's capacity to affect the behavior of other network members. The impact of a user is determined by the number of people they are connected to and their willingness to spread the message. Hence, c is the correct option.

You can learn more about nodes at: brainly.com/question/31324954

#SPJ11

Which type of evidence should victims collect to help officials catch cyber bullies

Answers

Answer:

(c)social media usernames

Explanation:

The type of evidence should victims collect to help officials catch cyber bullies is social media usernames.

What do you mean by the cyber bullies?

Cyberbullying is when someone is harassed, threatened, or intimidated through a cell phone, instant messaging app, email, or social networking sites.

Children frequently engage in cyberbullying because they have access to these technologies at an earlier and earlier age.

Cyberbullying victims may have a variety of negative consequences, such as mental health problems, subpar academic results, a desire to quit school, and even self harm thoughts.

Bullies themselves at a higher chance of developing problems like drug abuse and engaging in violence.

Therefore, the  type of evidence should victims collect to help officials catch cyber bullies is social media usernames.

To know more about the cyber bullies, visit:

https://brainly.com/question/4689569

#SPJ2

Which feature in PowerPoint is used to correct common capitalization and text formatting issues but can also be modified for more robust and personalized corrections?

Grammar Checker
Insights
Spelling Checker
AutoCorrect

Answers

Answer:

AutoCorrect: D on edge

Explanation:

Answer:

D.AutoCorrect

Explanation:

a software function that automatically makes or suggests corrections for mistakes in spelling or grammar made while typing.: a computer feature that attempts to correct the spelling of a word as the user types it The iPad boasts an autocorrect system that will try to figure out what you mean to type even when you don't quite tap the right keys.

The linux/unix command __________ can be used to search for files or contents of files.

Answers

The `grep` command is used for this. https://man7.org/linux/man-pages/man1/grep.1.html
Other Questions
4. What type of column can be seen on the Temple of Athena Nike, built on the Acropolisbetween 427 and 424 B.CE?A.DoricB. CorinthianC. HellenisticD. Ionic At a hockey game, a vender sold a combined total of 117 sodas and hot dogs. The number of sodas sold was two times the number of hot dogs sold. Find the number of sodas and the number of hot dogs sold. What role do you think Netflix and social mediaplayed in popularizing Marie Kondo? Do you thinkthe popularity of the show "Tidying up with MarieKondo' is based on Marie Kondo only, or would anyother personality achieve similar results? A quarter dollar coin shown below has a diameter of 24 mm. Which measurement is closest to the circumference of the coin in millimeters?Answer Choices: Please do this carefully, I will give brainliest if you get it right. 113. 04 mm This question is for 20 points. 75. 36 mm37. 68 mm150. 72 mm Write and solve an equation to find the measure of the unknown angle.please I am tired help The boy in this case first showed signs of his disorder when he began walking on his toes. What are all of the muscles that are used to walk on his toes? curry uses the term ""ecological fundamentalism"" to refer to the replacement of one true and universal god with nature. The process by which a phagocyte moves toward a chemical signal at the site of an infection is called? discriminant 4x^2-8x=5(x-2) Why are Michaels blood ammonia levels elevated and why are high levels of ammonia dangerous?A. Michaels blood ammonia is high due to the rapid degradation of proteins; high levels of ammonia lead to dangerous levels of ketone bodies in muscle.B. Michaels blood ammonia is high because he has been burning calories from vigorous exercise; high levels of ammonia lead to dangerous levels of ketone bodies in muscle.C. Michaels blood ammonia is high due to the rate of ketone body production in his body; high levels of ammonia are dangerous because ammonia passes easily through the blood-brain barrier and is highly toxic to the brain.D. Michaels blood ammonia is high because it is a byproduct of -oxidation of fatty acids; high levels of ammonia lead to dangerous levels of ketone bodies.E. Michaels blood ammonia is high due to the rate of protein wasting (catabolism of non-essential proteins to provide glucogenic carbon skeletons) in his body; high levels of ammonia are dangerous because ammonia passes easily through the blood-brain barrier and is highly toxic to the brain. To make your choices, think about which event you think is most important in each group. Answer for each one.New Philosophies------------------------------------------------------------ Industrialization in BritainWriting of Adam SmithWriting of Karl MarxWriting of Thomas MalthusWriting of John Stuart MillWriting and New Harmony of Robert OwensImperialism ------------------------------------------------------------Monroe DoctrineSepoy MutinyKorean colonizationBoer WarCrimean WarOpium WarsBoxer RebellionItalian and German Unification ------------------------------------------------------------Founding of Young ItalyIl Risorgimento newspaperGiuseppe Garibaldi appointed generalSeven Weeks WarFranco-Prussian WarZollvereinRecent Movements ------------------------------------------------------------Independence movement of one of the followingAlgeria, Belize, Kenya, LibyaMeiji RestorationNegritude MovementProgressive MovementSocial reform of one of the followingAbolition, Education, Health, Unions, Temperance, Women's Suffrage estimate the sum. I will give 5 points and brainiest. Which nutrient is necessary for healthy bones? a. niacin b. fiber c. thiamin or d. calcium commercial refrigeration equipment for eggs produce and dairy uses In an exchange economy, there are 2 goods, and . Consumer 's utility function is and consumer 's utility function is . Consumer 's endowment is and consumer 's endowment is . Find the equilibrium price ratio, ? Suppose males in the first mating had a mutant allele for the dominant trait of smaller eyes. What fraction of the females would produce some offspring with smaller eyes? What features do all right trlangles have in common? Under eda, the "commission" means the professional standards and practice commission.a. Trueb. False In the study by Batson and colleagues, White students were given a choice of watching a movie with a White student or with a Black student. The study reported that intrinsically religious persons __________. Bank A has $25,500 in required reserves. The required reserve ratio is 10 percent. Bank A has total deposits of:_________.